نتایج جستجو برای: security issues in summary process

تعداد نتایج: 17146815  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1390

introruction khawf in(iran)-herat and mazaresharif and shirkhan bandar in (afghanistan)-dushanbe in (tajikistan)_(kirgizstan)-kashghar in(china) project railway network is under construction that it is as a significant corridor for revitalizing silk road corridor in the region .at the present there are three different gauge in the region central asia with 1,520 mm gauge and turkey-islamic repu...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده ادبیات و زبانهای خارجی 1389

abstract tasks nowadays are at the center of attention in sla research. task types is one of the critical issues in this regard, their effectiveness and suitability to any particular context, their characteristics and the result they yield are among some of these issues. on the other hand, discourse markers (dms) have been very much investigated and their effectiveness in conveying the meaning...

The Middle East due to communication pathway, energy sources, imperialist experiences, its cultural conflicts and geopolitic conditions, has found a realistic environment based on problems of public, national and regional security.In a way that these conditions have not led to any peace and stability in  the Middle East region. Therefore, study of process of formation of security issues in the ...

Journal: :Water 2023

Affected by global climate change and rapid socio-economic development, China faces serious water security issues, especially in terms of shortages, flood disasters, water-related ecological environmental problems [...]

Journal: :CoRR 2013
Rashmi Rai G. Sahoo Shabana Mehfuz

Cloud computing, undoubtedly, has become the buzzword in the IT industry today. Looking at the potential impact it has on numerous business applications as well as in our everyday life, it can certainly be said that this disruptive technology is here to stay. Many of the features that make cloud computing attractive, have not just challenged the existing security system, but have also revealed ...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و زبانهای خارجی 1390

abstract this research is about a longitudinal case study of english morpheme acquisition by a persian speaking child l2 learner of english (2 .9-3).the goal of this research has been discovery of the child ‘s ability in acquiring of english morphemes in a persian context while only one person (the child’ s father)has been talking to her.this child has also been exposed to english languag...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده علوم اجتماعی 1393

the present study is paid to the evaluation of the welfare program of the unemployment insurance in iran. the main purpose which was the main reason for performing this thesis, was the unemployment insurance plan’s challenges in iran such as financial problems of this plan, prolongation of the credit receipt for some insured people, unemployment slow exiting from the unemployment insurance fund...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1389

the quest for power has formed much of the world history especially in 20th and 21st centuries. oil (energy) particularly after industrial revolution has been a tool for conquest and power and has been transformed to a geopolitical issue. from a geopolitical point of view this has been the case for the last two centuries in central asia and caucasus. central asia and caucasus has always been...

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

2008
David Carman Peter Kruus Sasha Slijepcevic Miodrag Potkonjak Vlasios Tsiatsis Scott Zimbeck

The short paper draws a concrete map Figure 1 of security issues in sensor network. The literature survey is done and the sensor-relevant security areas are categorized into Table 1. A concise summary is given at the end.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید